Open Data Center Alliance Publishes Big Data Consumer Guide

Open Data Center Alliance Publishes Big Data Consumer Guide

Document Promotes Big Data and Outlines a Plan to Provide Concrete Recommendations and Insight to Benefit both Big Data solution providers and Enterprise Consumers

PORTLAND, Ore., December 19, 2012The Open Data Center Alliance (ODCA) today announced that it has published a new document, titled Open Data Center Alliance: Big Data Consumer Guide to help address the quickly growing need to address big data and associated solutions. A recent report from the states that 15 out of 17 U.S. business sectors have more data stored per company than the U.S. Library of Congress. And by some estimations, 90% of that data has been created in the last two years.

The Big Data Consumer Guide provides an introduction and overview of Big Data, and establishes a common language and definitions that enterprises can use when working with Big Data vendors. The Big Data Consumer Guide was created to allow Enterprises to better understand Big Data and achieve a balance between existing investments and new ones that best address the exponentially increasing volume, velocity, and variety of enterprise data.

The paper will ensure that all parties utilizing and offering big solutions are able to communicate using common terms to help make the process easier and more transparent. The paper also provides insight into potential Big Data use cases.

The ODCA also hope to lay the foundation for a set of future work by the ODCA Data Services Working Group (DSWG). ODCA’s DSWG was established in 2012 to bring solution providers and big data consumers (enterprises) together to help drive the creation of Big Data technologies that are open and standards-based, with a greater degree of interoperability and cost effectiveness for large enterprises in line with the overall mission of the Alliance.

To download the Open Data Center Alliance: Gig Data Consumer Guide and to find out more about the ODCA Data Services Working Group, please visit www.opendatacenteralliance.org.

About The Open Data Center Alliance

The Open Data Center Alliance℠ is an independent IT consortium comprised of global IT leaders who have come together to provide a unified customer vision for long-term data center requirements. The Alliance is led by a twelve member steering committee which includes IT leaders BMW, Capgemini, China Unicom, Deutsche Bank, JPMorgan Chase, Lockheed Martin, Marriott International, Inc., National Australia Bank, T-Systems, Terremark, Disney Technology Solutions and Services, and UBS. Intel serves as technical advisor to the Alliance.

In support of its mission, the Alliance has delivered the first customer requirements for cloud computing documented in Open Data Center Usage Models which identify member prioritized requirements to resolve the most pressing challenges facing cloud adoption.

Find out more at www.opendatacenteralliance.org.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…